5 Tips to Protect Your Laptop from Physical Damage
A laptop can hold your life. If you’re working from home, it’s essential to your income. For students, it’s where you keep all your notes and essays. Plus, there are the personal photos and videos. And you sometimes use it to stream your TV shows, or to video chat with friends and family. You may even make music, create art, or be writing the next bestselling novel on your laptop. So, you want to keep it in great shape. Here are five tips to protect your laptop.
#1 Don’t drop it
Or throw it, or stand on it, or expect it to withstand any serious impact. OK, that’s pretty obvious. You also don’t want to use your laptop in the bathtub or at the pool. Even a simple water spill on a laptop can damage the circuitry. If you do get your laptop wet, immediately turn it off and unplug everything attached to it.
#2 Open carefully
Laptops are getting thinner in every iteration. Some now even have foldable screens. The thinner and more flexible screen may look sleek and cool, but it’s also less rigid, which makes it more prone to damage. Especially on lower-cost laptops, the screen can flex if you open the computer up from just one side.
Yet, many of us hold a laptop in one hand and open the lid with the other. This can cause the screen to twist. Use both hands to open the laptop. Or get into the habit of opening your laptop from the center to avoid flex.
#3 Don’t bedazzle your keyboard or screen
Alright, maybe you weren’t planning on putting faux rhinestones on the screen or keyboard. Still, reconsider any decorations you have thought of adding. Even a keyboard protector (to prevent dust or spills getting into the circuitry) or camera privacy sticker could damage some of the new super-thin laptops. It’s just that there is now so little clearance between the keyboard and the screen.
If you really must have your stickers, put them on the protective sleeve that you get for your laptop.
#4 Disconnect carefully
Your laptop needs a consistent power source. If you damage the power cord connection, you’re done. So, make sure you pull the power cord out straight. Yanking it out sideways could damage the port.
Also be aware of where your power cord is connecting to the wall outlet. If you leave the cord trailing along the floor, someone could trip over it, or it could get caught on a rolling chair. This could not only damage the charging port but even pull the entire laptop onto the floor. That brings us back to #1, don’t drop the laptop!
#5 Keep it cool
No, you don’t have to store it into a refrigerator (please don’t!), but heat isn’t good for your laptop. You’ll want to keep your computer away from external sources of heat.
Again, as the laptops get thinner, they are more vulnerable to internal overheating. Ensure that the laptop’s intake ports are unblocked so that air can flow through and cool the circuitry. You might also blow dust out of the vents using canned air.
Also, avoid placing your laptop on very soft surfaces. A soft, uneven surface is more likely to block the internal fans. This leaves your device unable to regulate its temperature. You could even buy a laptop cooling stand, which provides extra fans to improve air circulation.
Average laptop lifespan will vary between two to five years. Keep your laptop on the longer side of that by taking these tips to heart.
If something does happen to your laptop, give us a call at (651) 456-8655. Our IT experts are here to help you find the best laptop for you, upgrade and secure your laptop, or fix your laptop when you need it. You may also send us a message from our Contact page.
Setting Your Scholar Up for Online Learning – Schools around the world have closed their doors during the COVID-19 crisis, students from kindergarten through graduate school are being asked to learn online. It’s a change for everyone, but having the right technology in place can help with the transition.
Your student may have been using the Microsoft Office suite of software at school. If you don’t have Microsoft Word, Excel, and PowerPoint at home, check if your school is providing licenses or free software.
If not, buying a subscription to the online Microsoft 365 package allows you to pay monthly or yearly, and it’s much more affordable than in the past. One month is about the cost of two cafe coffees.
Otherwise, your student may be able to get work done using Google’s suite of tools. Teachers may accept links to Google Docs, Sheets, or Slides. These free options are also useful when your student needs to work on a group project. People can collaborate online in real-time using the G-Suite software.
Teleconferencing with Teachers and Peers
Your student is likely to need to download teleconferencing software such as Zoom or Skype. Beware! Cyber-criminals take advantage of every opportunity. Noticing the increased demand for these services, they’ve set up bogus sites. Make sure that you are downloading from the legitimate sources: www.skype.com or www.zoom.us.
While we’re talking about teleconferencing, you might pass on these best practices:
Use headphones to limit audio distractions.
Join calls from a low-traffic setting with simple backgrounds.
Ask others at home to avoid downloading, streaming, or backing up while the student is live online.
Connect to the router with a network cable, or at least be as close to the wireless router as possible during the call.
Considering Cyber-security
In addition to setting up fake teleconferencing sites, cyber-criminals have other ways to exploit the situation.
Remind any students learning from home that they need to keep their username and password private. This is a lesson that never gets old.
Are you still using Windows 7 on a home computer? This popular operating system (OS) reached the end of its life in January 2020. Yes, it may still work, but it is no longer receiving security updates from Microsoft, and the bad guys know Windows 7 is vulnerable. Continuing to use this OS puts you at risk. Without new upgrades, you’re no longer protected from vulnerabilities or exploits.
You probably already know to avoid using public wireless networks. Although your students can’t go to a coffee shop or public library right now to get online, reminding students to secure their online activity is critical.
This is a good time to review your WiFi setup. Too many homeowners don’t change the default username and password on their routers. Big mistake. You should also:
hide your WiFi network from public view;
set your network up to encrypt transmissions;
update router software regularly.
A Focus on Learning
There’s one more thing parents and guardians might consider. At school, the computers prevent students from going to certain sites or downloading files, but you may not have the same blocking and filtering set up on your home devices. This can be addressed in settings.
If you have to share a computer, set up a student-specific user profile to:
prevent your student from getting distracted during learning;
limit exposure to malware and cyber-threats;
avoid them accessing any of your work files.
You may feel isolated during the coronavirus quarantine, but you’re not alone. Our tech experts can help you set up and secure your technology for work or school from home. Give us a call today at (651) 456-8655 or visit our Contact page.
Steer Clear of Coronavirus Scams (4/9/2020) – With the world grappling with a health pandemic, scams are shocking. Regrettably, bad actors are everywhere, always looking for opportunities, and they’re seeing one in the Coronavirus. This article outlines what you need to watch out for and how to stay cyber safe.
The last thing you want to read right now is that there’s another threat out there – sorry, but it’s true. Cybercriminals take advantage of fear. They take timely concerns and use them to target victims. Using the anxiety and upheaval around Coronavirus is their mission.
So far, several Coronavirus-related attempts to cyber-scam people have been reported. There are examples of:
emails that appear to come from government health departments;
offering a tax refund to get people to click on malicious links;
memos to staff that appear to come from large employers;
COVID-19 test offerings from private companies;
fake websites promising to sell face masks or hand sanitizer;
soliciting donations to help fund a vaccine.
What to Watch Out For
Another concern is the number of bogus websites registered with names relating to COVID-19. The site can look legit but is set up to steal information or infect the victim’s computer with malware.
You may get an email promising the attached information offers Coronavirus safety measures, or information shared by the World Health Organization (WHO) if you click on the link, or a similar email pretending to be from a reputable news source, such as the Wall Street Journal (WSJ).
In another example, an email impersonating a healthcare company’s IT team asked people to register for a seminar “about this deadly virus.” Anyone who didn’t question why IT was organizing the meeting clicked to register. By filling out the form, they gave their details to hackers.
What to Do
Be cautious. It’s understandable that you’re anxious, but don’t let that stop you from taking cyber precautions. You should still:
be wary of anything that tries to play on your emotions and urges immediate action;
question where emails are coming from – remain vigilant even if the communication appears to come from a reliable source;
hover over links before clicking them to see where they will take you – for example, in the WSJ example, the Web address was for the “worldstreetjournal”;
avoid downloading anything you didn’t ask for;
doubt any deals that sound too good to be true (“a mask that stops the virus 99.7% of the time!”);
ignore any communications requesting your personal information;
don’t be suckered by fraudulent pleas for charity.
Global health organizations generally do not send out emails with advice. Instead, navigate directly to that reputable health institution for real news.
If you’re still not sure about the validity of the communication, check it out. Do so by calling or using another medium to get in touch with the “source” of the received message.
While there is not yet a vaccine for COVID-19, you can put anti-virus protection on your computer. Also, make sure that you’ve applied all available security updates to keep your software safe.
We hope you’ll take care and stay healthy both physically and online in these tough times.
Need help installing security software and keeping your technology safe? Our cyber-security experts can give your home a tech immunization. Contact us today at (651) 456-8655 or visit our Contact page!
Requesting Service During Minnesota’s COVID-19 Shelter-in-Place Order – Minnesota Governor, Tim Walz, has ordered Minnesotans to stay home except for essential needs during the period of March 27th – April 10th. Department of Homeland Security CISA has classified IT Support Providers as Essential Critical Infrastructure Workers.
During this unprecedented time, your home PC is considered an essential tool. Many are using their home PCs to work from home, for child education, home banking, shopping, paying bills, etc. That being said, Twin Cities PC Repair will remain open to serve our clients in the event you have issues with your PC..
For more information on Essential Critical Infrastructure Workforce, visit the DHS HERE.
Due to limited secretarial staffing at our offices, If you require sales or support, we are asking our clients to do one of the following prior to visiting our offices:.
1.) Call our office at (651) 456-8655 to arrange a pick up, drop off or remote support session.
The Advantages of Ad Blocking – Unless you’re in the advertising business, you probably try to avoid ads. You pay extra to stream ad-free content online. You leave the room if you are actually watching live TV shows with ads. You filter spam out of your inbox. You immediately click out of ads on the Web pages you visit. But are you actively blocking online ads? You should be. They are more than an annoyance. They could be a security risk.
Cyber-criminals are smart and savvy crooks. They don’t advertise what they are doing, and it’s not that easy to spot, but they do buy legitimate ad space to lure users to malicious sites.
Malvertising uses legitimate online advertising networks to target you with malicious code. Sites you know and trust that use legitimate ad networks can end up serving up the malicious ads. Cyber-criminals have run ads on the New York Times, Spotify, and the London Stock Exchange redirecting to malicious websites.
Adware is another risk. Packaged with legitimate software, adware runs on your computer without your knowledge. It displays unwanted advertising, redirects search requests to ad websites, and mines your data.
The cyber-criminal wants to steal your ID, or your financial and contact data, or to encrypt your information, spy on, or hijack your computer.
They can do this with exciting ads ($9 iPads?!) or alerts (often warning about infections) to get your click. But they can also take a drive-by download approach. In these cases, you don’t even need to click on anything. You load the Web page hosting the ad (or malicious pop-up window). You’re directed to a page that finds browser or software security vulnerabilities to access your machine.
Protecting Against Malvertising
Keep your software up to date, and run antivirus checks to protect against downloads and malicious code. Avoiding Flash and Java helps too, as they are commonly exploited by malvertisers.
Cyber-criminals mostly target Windows users, because the huge user base gives them the best return on investment. But Macs are just as vulnerable to malvertising attacks. — MalwareBytes
Installing an ad blocker plugin prevents the ad loading in the first place. These take away the annoyance of ads and help you avoid falling victim to a malicious attack hidden in an ad.
At the same time, you will enjoy cleaner Web browsing, and you won’t have to worry about distracting ads flashing at you while you read.
Your pages will also load faster. The ads often run a lot of code on top of the website code your computer needs to read and load. The images or video, for instance, can make a difference to data usage. So, the less you have to load, the faster you’ll get to the content you wanted. This can also help to preserve the battery life of your mobile devices!
There are some other considerations, though. For one, not all ad blocker plugins can be trusted. Some will mine your data and sell it to advertisers, which is exactly what you don’t want happening.
Also, some websites won’t load correctly without the ad code. You can turn off ads on a site-by-site basis. After all, some free sites that you frequent might rely on ad revenue, so there may be sites you trust that you want to support by turning off your ad blocker just for those sites.
Always think before you click. Updating browsers and plugins and installing ad blockers can also help.
For the peace of mind that comes with ad blocking and keeping your computer security current, give us a call at (651) 456-8655 or visit our Contact page. We can help set you up to enjoy a safer online experience.
Computer cleaning for the new year – The new year can mean resolutions and promises for a “new you.” One way to start this year feeling more in control is to clean up your computer. Follow these simple steps!
Tackle the inbox
We do a lot of shopping at the end of the year. Whether you shop online or in stores, you’re asked to provide your email address when you buy, which multiplies the number of mailing lists you’re on. Don’t start the new year deluged by unwanted newsletters and advertising emails.
The extra messages in your inbox distract you from the messages that matter. Instead of deleting every new unread message from “Let’s Make Cookies,” click on one and unsubscribe. Usually, there’s a link that lets you do this at the bottom of the email. If you’re a Gmail user, start your effort to cut down on unwanted mail in your Promotions tab. Google’s algorithm sends sales pitches here, so cut messages from this section first.
Clear bookmarks
The internet is built for browsing. We’ve all lost hours to clicking and linking in this vortex of information. “Wait. How did I end up here looking at kittens eating cupcakes?!” To make things easier, we’ll bookmark sites we visit often or put a page we want to return to on a reading list.
By the end of the year, we have marked many sites that we don’t even remember favoriting in the first place. “When was I interested in this?” Getting rid of any bookmarks for passing interests can help you navigate the Web better this year.
In Google Chrome, click on the three dots in the upper-right of your browser window (to the left of your profile icon). The drop-down menu will have a Bookmarks option. Click on this to see another drop-down menu with Bookmark Manager on it. On the next screen every one of your bookmarks will have three dots beside it. Click on this to select the delete option, and get rid of the ones you don’t need any longer.
Safari users can click on Bookmarks on the top menu or the sidebar icon on the tool bar (to the right of the arrows on the left). Then edit your bookmarks by clicking on sites you no longer want and hitting your delete button.
Sort through downloads
We also download a lot of stuff in a year. Sometimes, because we’re impatient or don’t realize we’ve already hit download, we get multiple copies of the same file! A full download folder takes up storage space on your computer and can slow your computer down.
On a Mac, go to the Finder and click on Downloads on the “Go” drop-down menu. You’ll find a folder filled with .pdfs, .docs, and .jpegs you long forgot about. Click on those you don’t need any more and drag them to your trash can.
On Windows, you can usually go to the “This PC” icon and then the “Downloads” Folder. Right-click on the files you don’t want, and choose “Delete.”
Empty trash/recycling bins
Items you put in the trash or recycling bins at home take up space until you take those bins to the curb or the dump, and the same is true of your computer trash or recycling. Empty these bins by selecting “empty trash” on your Mac Finder menu, or “empty recycle bin” after clicking on the bin icon in Windows 10.
Remove unused programs/apps – If you’re not using a program or app, don’t give it computer space. On a Mac, you can click on the icon for that program and drag it to the Trash. With Windows, you’ll open the Start menu, click on Settings, then System, then Apps and Features from the left pane to select what you want to uninstall. Click the uninstall button, and you’ve de-cluttered your computer that little bit more for the new year.
Windows 7 support ends on January 14, 2020 – Microsoft made a commitment to provide 10 years of product support for Windows 7 when it was released on October 22, 2009. When this 10-year period ends, Microsoft will discontinue Windows 7 support so that we can focus our investment on supporting newer technologies and great new experiences. The specific end of support day for Windows 7 will be January 14, 2020. After that, technical assistance and software updates from Windows Update that help protect your PC will no longer be available for the product. Microsoft strongly recommends that you move to Windows 10 sometime before January 2020 to avoid a situation where you need service or support that is no longer available.
What does end of support mean for me? After January 14, 2020, if your PC is running Windows 7, it will no longer receive security updates. Therefore, it’s important that you upgrade to a modern operating system such as Windows 10, which can provide the latest security updates to help keep you and your data safer. In addition, Microsoft customer service will no longer be available to provide Windows 7 technical support. Related services for Windows 7 will also be discontinued over time. For example, certain games such as Internet Backgammon and Internet Checkers as well as Electronic Program Guide for Windows Media Center are scheduled to be discontinued in January 2020.
What should I do?
For most Windows 7 users, moving to a new device with Windows 10 will be the recommended path forward. Today’s PCs are faster, lightweight yet powerful, and more secure, with an average price that’s considerably less than that of the average PC eight years ago. Our Guide can help you choose a new PC in just a few easy steps.
Want to learn more about Windows 10? Check out our overview page to learn more.
Can I upgrade my existing PC to Windows 10? To take advantage of the latest hardware capabilities, we recommend moving to a new PC with Windows 10. As an alternative, compatible Windows 7 PCs can be upgraded by purchasing and installing a full version of the software. For more information, see Windows 10 upgrade FAQ.
How can I upgrade to Windows 10 for free?
The Windows 10 free upgrade offer ended on July 29, 2016. To get Windows 10 you will need to either purchase a new device or, if you have a compatible PC, purchase a full version of the software to upgrade your existing device. We recommend that you don’t install Windows 10 on an older device, as some Windows 7 devices are not compatible with Windows 10 or could experience reduced feature availability.
What happens if I continue to use Windows 7?
If you continue to use Windows 7 after support has ended, your PC will still work, but it will become more vulnerable to security risks and viruses. Your PC will continue to start and run, but you will no longer received software updates, including security updates, from Microsoft.
Can Windows 7 still be activated after January 14, 2020?
Windows 7 can still be installed and activated after end of support; however, it will be more vulnerable to security risks and viruses due to the lack of security updates. After January 14, 2020, Microsoft strongly recommends that you use Windows 10 instead of Windows 7.
Will Internet Explorer still be supported on Windows 7?
Support for Internet Explorer on a Windows 7 device will also be discontinued on January 14, 2020. As a component of Windows, Internet Explorer follows the support lifecycle of the Windows operating system it’s installed on. See Lifecycle FAQ – Internet Explorer for more information.
Will Microsoft Security Essentials continue to protect my PC after end of support? Microsoft Security Essentials (MSE) will continue to receive signature updates after January 14, 2020. However, the MSE platform will no longer be updated. Click here to learn more about learn more about Microsoft Security Essentials.
What if I’m running Windows 7 Enterprise?
If you are using Windows as part of a work environment, we recommend you check first with your IT department or see Windows 10 deployment support to learn more.
What about Windows 7 Embedded? Windows for embedded devices such as ATMs or gas pumps have lifecycle dates that sometimes differ from versions of Windows that are used on PC devices.
Can I move my existing programs to a new Windows 10 PC? For the best possible experience, we recommend doing a fresh installation of your programs and apps on your new Windows 10 PC. Microsoft Store has a variety of third-party apps that can be easily downloaded and installed. On your Windows 10 PC, you can open Microsoft Store by selecting the icon on the taskbar or by searching for “Microsoft Store” in the search box on the taskbar.
For any software not currently available in Microsoft Store, we recommend going to that company’s official website and downloading the Windows 10 version from there. In limited circumstances, some older software may not have an updated version that’s compatible with Windows 10.
How will Windows 7 end of support affect my Microsoft Office apps?
Your experience may be different depending on the Office version you’re running. To learn more, see Windows 7 end of support and Office. It’s important to note that Windows 7 itself will no longer receive security updates, leaving your device vulnerable to security threats. As such, if you’re running Microsoft Office on a Windows 7 PC, we recommend you move to a new Windows 10 PC.
Now that you’re probably confused about Microsoft’s explanations above, there is no need to worry because you’re in good hands with Twin Cities PC Repair!! We can certainly take this burden off you by offering upgrade options for your current PC or the option to upgrade to a new or refurbished PC which is already Windows 10 certified. Please feel free to call us at (651) 456-8655 or visit our CONTACT page.
Why You Need Professional Virus Removal. “Your computer has a virus.” Such a dreaded five words! We don’t want to come down with a human virus; we’ll feel awful and miss work. But when a virus hits our computer, we could lose valuable information or be vulnerable to attack. Chicken soup won’t cut it.
Perhaps you have an antivirus product installed on your computer. This computer software is intended to prevent, detect, and remove viruses. Antivirus tools are designed to keep infections out. They can also delete any viruses that may already be on the computer when the software is installed.
The software provides protection by tracking malicious code and other computer threats via:
classifying the actions the file or code drives (as malicious or OK);
inspecting file signatures for matches to an existing signature in its virus dictionary;
scanning for rootkits that can change how your operating system functions.
However, antivirus software isn’t that good at cleaning up. When it detects a malicious file, it will delete it. But what if the virus spread before discovery? If the infection spreads before virus deletion, it can do all sorts of damage.
Think of it this way: you have a cyst on your knee. Doctors decide it is pre-cancerous and operate to remove the cyst before it spreads. But, that’s all they do. They have seen the cyst. They go for the cyst. However, they don’t notice the cancer that’s in your shin or femur, because they were only working on the cyst. The rest of your leg remains unhealthy, and you don’t even know it!
Getting a Second Opinion on Viruses
If the antivirus software is your primary physician, a computer professional is the specialist you go to for an expert second opinion. For one thing, antivirus products don’t always remove all the malicious files. Many viruses start as one thing but can mutate into several different strains. The antivirus software may not be programmed to identify all of the virus variants. A professional actively looks for undetected strains on your computer.
Viruses are always evolving. A recent strain of malware, SquirtDanger, let hackers take computer screenshots, capture passwords, download files, and empty out cryptocurrency wallets.
Some viruses can change the settings of your computer. For instance, a common virus changes your computer’s DNS, which is like a bit like the Yellow Pages for the internet. On a virus-free computer, when you type in “Google.com”, your browser goes to Google’s servers located at the IP address “216.58.203.100.” However, an infection can make Google.com on your computer go to a different address. Perhaps a server address cyber criminals use to capture your personal data. It still looks to you like Google, but it’s no longer safe. These settings can still remain after the infection is long gone.
Viruses can also leave behind browser toolbars, extensions, and other nasties designed to spy on your Web browsing habits. If you’re consistently redirected to unwanted sites, or seeing unwanted pop-up advertisements, it’s likely your computer’s infected with a browser hijacker.
Ultimately, if you detect a virus on your computer, check with a professional. Don’t trust that your antivirus software is going to do the same, thorough job an expert can offer. Sometimes your computer isn’t fully safe until the operating system is reinstalled, but you can’t know that until someone can go in and see what the virus did and what remnants are still there, lurking.
Cyber criminals are growing more sophisticated and better able to design viruses that disguise their tracks. Avoid being an unwitting victim. A computer security expert can diagnosis when your computer gets a virus, or determine if there are strains on your device you don’t know about. Let a security expert protect your computer from harm today! Call us at (651) 456-8655 or visit our Contact page.
What Happens to Your Data When You Die? Death is a morbid topic most of us try to avoid. Making a will and saying we prefer cremation is the extent of our advance planning. Yet, you may want to also think about what’s going to happen to your data.
Consider your digital footprint. You have photos, files, and emails on your computer and your phone. You’re also documenting your life on social media, and sharing on more than one channel.
Your wearable technology (say an Apple Watch or a Fitbit) may be recording information too. If you have a virtual assistant in your home, it’s recording your search history and saving that data on the cloud.
Yet many of us never think “what will happen to my data after I die?” Do you want it deleted? Are there digital assets you want to share? Perhaps there is tangible value attached to some of your digital assets. At the very least, some photos and videos that may have sentimental value for those who survive you. So, let’s explore advance planning you can do to protect your digital legacy.
Personal Files on Computer or Phone
Your personal devices are password protected. While necessary, this makes it more difficult for your survivors.
Now, they could physically pull the computer or phone apart if needed. But, it’s easier to have a copy of your passwords in a secure place for someone to access in the event of your death. Another option is to use a password manager. You can designate someone as your backup contact. They will be able to gain access to your passwords should you die.
Digital Media Collections
Often, when you click the “Buy” button, you’re not really purchasing that movie or music forever. Your contract with iTunes, for instance, was only for your lifetime. Your rights expire at your death.
Cloud Accounts
Consider the personal and private data you have in the cloud, such as Google or Microsoft’s Outlook. This might include calendars, emails, GPS, documents and financial information.
Google’s Inactive Account Manager lets you make plans for your account. You decide:
When Google should consider your account inactive
What it should do with your data afterwards
Whether to share account access with someone (providing email and phone number)
When or if your account should be deleted.
Microsoft won’t provide your passwords after death. However, via their Next of Kin process someone could be sent a DVD of the data in your outlook.com account.
Other cloud providers ask for proof of death and of legal right to access. In Dropbox’s case for instance, your survivors will need a court order. Even with all this, there’s no guarantee your personal data is completely removed from the cloud. It may exist in other datasets in system backups.
Social Media Accounts
Social media companies do not provide login credentials. Many require proof of identity and a death certificate to deactivate the account. Facebook and Instagram will “memorialize” your accounts. The public can’t see, but Friends or Followers can still view it and post memories. You can assign a legacy contact to look after the account or have it deleted.
You don’t want someone using your social account to send out spam or inappropriate photos. For instance, a sexy spam bot took over a New York Times media columnist’s Twitter after his 2015 death.
Plan ahead to protect your privacy and provide access where necessary. Think of the pain and heartache you can save your survivors by managing your digital legacy now.
OK Google, How Safe Are You Really? Are you prompting Siri, Google, or Alexa? When you talk to a home assistant, you join a growing number of smart homes.
Smart home assistants search online, start phone calls, order groceries, play music, turn lights on. All with a single spoken command.
Research into how people use Google or Alexa demonstrates the core features. Listening to music ranked first. Checking weather and asking for general information rounded out the top three. Setting timers and reminders, asking for the news or jokes (perhaps to make up for the news?) are also common.
Yet, the question remains, just how safe are these virtual assistants? After all, having a smart speaker in your home means there is always an open microphone in your house.
Smart Speaker and Home Assistant Safety Concerns
The convenience of the speaker demands that it always be on, ready and waiting for you to say “Hey Siri” or “OK Google.” Once triggered the device records the command, sends the data to servers for processing, and figures out its response.
Smart speaker users can log in to view the history of queries on their accounts. This prompts some concerns that these mega-companies will use the information for financial gain. For example, those talking about an overseas holiday might start seeing related ads on their computers.
Someone hacking into the home assistant to gain access to your personal information is another concern. Those who set smart speakers as a hub for many devices also create more points of vulnerability.
It’s difficult to anticipate all the ways the assistant could prove too good a listener. In one case, a voice assistant recorded a private conversation and sent it to the couple’s contacts list.
Steps to Stay Secure with a Smart Speaker
That candid conversation share aside, few big privacy flubs or personal data breaches have been reported. Nevertheless, if taking advantage of Alexa, Siri, or Google helper, keep these strategies in mind.
Clear your history. Don’t leave everything you’ve ever asked it stored on the company server. The assistant will relearn your commands quickly.
Connect with caution. It’s great to be able to turn on the TV and dim the lights without leaving the comfort of your sofa. Be wary of connecting security or surveillance devices to your home assistant.
Mute the microphone. Yes, it undermines your ability to call from the closet “OK, Google, what’s the weather like today?” But, turning off the mic when it’s not in use stops recording without you knowing about it.
Secure your network. Home assistants do their work by connecting to the Internet using your network. Ensure they are accessing a password protected network. They should use devices (e.g. modems) changed from default password settings.
With a little effort you can gain convenience without worry.
Want more questions answered about setting up a smart speaker to be safe and reliable? We’re here to help. Give us a call at (651) 456-8655 or visit our Contact page.
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.AcceptNoPrivacy policy
Recent Comments